Question & Answer
Question
This video describes the Data Model of IBM Security Identity Governance and Intelligence, with the dependencies and interactions among the key elements.
The video provides a brief tour of:
- Identities and users in IGI
- Users and entitlements
- Business activities, risks and mitigations
- Connecting the role-based and the business activities models
Duration: 5 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy
Answer
The Security Learning Academy is a full service learning platform, providing various training objects and instruction options.
Related Information
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSGHTN","label":"IBM Security Identity Governance and Administration"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" ","Line of Business":{"code":"LOB24","label":"Security Software"}}]
Was this topic helpful?
Document Information
Modified date:
04 October 2021
UID
ibm11289248